Generalized hash-binary-tree based self-healing key distribution with implicit authentication
We propose a self-healing key distribution scheme with implicit authentication following a hash-binary-tree based key distribution scheme. The scheme reduces storage overhead without increase of communication and computation overhead. Implication authentication is subtly introduced to detect tamper...
| Main Authors: | Tian, Biming, Han, Song, Xie, Miao, Parvin, Sazia |
|---|---|
| Other Authors: | Mario Gerla |
| Format: | Conference Paper |
| Published: |
IEEE
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/16483 |
Similar Items
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
A collision resistant cryptographic hash function based on cellular automata rules
by: Jamil, Norziana
Published: (2013)
by: Jamil, Norziana
Published: (2013)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Dynamic Memory Allocation for CMAC using Binary Search Trees
by: Scarfe, Peter, et al.
Published: (2007)
by: Scarfe, Peter, et al.
Published: (2007)
Interconnected autonomous microgrids in smart grids with self-healing capability
by: Shahnia, Farhad, et al.
Published: (2014)
by: Shahnia, Farhad, et al.
Published: (2014)
Towards enhanced key management in multi-phase ZigBee network architecture
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Chaotic map based key agreement with/out clock synchronization
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A Note on Collaborating Adversaries in the Srinathan-Kumar-Rangan Transmission Protocol
by: Moss, Ben
Published: (2003)
by: Moss, Ben
Published: (2003)
Prime implicants for modularised non-coherent fault trees using binary decision diagrams
by: Remenyte-Prescott, Rasa, et al.
Published: (2007)
by: Remenyte-Prescott, Rasa, et al.
Published: (2007)
Improving reliability calculation with augmented binary decision diagrams
by: Herrmann, Johannes u
Published: (2010)
by: Herrmann, Johannes u
Published: (2010)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
On the reduction theory of binary forms
by: Cremona, John E, et al.
Published: (2001)
by: Cremona, John E, et al.
Published: (2001)
A Model For Binary Response Variable With Time-Censored Observations
by: H.A. Adlan, Hanan
Published: (2000)
by: H.A. Adlan, Hanan
Published: (2000)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Palm tree detection in UAV images: a hybrid approach based on multimodal particle swarm optimisation
by: Chen, Zi Yan
Published: (2022)
by: Chen, Zi Yan
Published: (2022)
Factors influencing the accuracy of remote sensing classifications: a comparative study
by: Pal, Mahesh
Published: (2002)
by: Pal, Mahesh
Published: (2002)
Effect of thymoquinone and thymoquinone-loaded nanostructured lipid carrier in in vitro wound healing model
by: Alexander, Henna Roshini
Published: (2019)
by: Alexander, Henna Roshini
Published: (2019)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Developing stromal instructive niches to promote wound healing
by: Latif, Arsalan
Published: (2021)
by: Latif, Arsalan
Published: (2021)
Microfluidic Production of Cell Instructive Microparticles in Wound Healing
by: Imir Tekneci, Zeynep
Published: (2025)
by: Imir Tekneci, Zeynep
Published: (2025)
Strength recovery and healing efficiency of cement-based materials containing autogenous healing binders and autonomous encapsulated healing agents
by: Mohammed, Abdulmohaimen Imad
Published: (2021)
by: Mohammed, Abdulmohaimen Imad
Published: (2021)
Encapsulated healing agents for asphalt self-healing
by: Al-Mansoori, Tariq Hussein Abees
Published: (2018)
by: Al-Mansoori, Tariq Hussein Abees
Published: (2018)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
Evaluation of cutaneous wound healing activity of ethanolic extracts of Morinda citrifolia L. fruits, Melastoma malabathricum L. and Terminalia catappa L. leaves in sprague dawley rats
by: Reduan, Mohd Farhan Hanif
Published: (2018)
by: Reduan, Mohd Farhan Hanif
Published: (2018)
Hydrodynamics of binary mixture fluidization in a compartmented fluidized bed
by: Gorin, Alexander, et al.
Published: (2008)
by: Gorin, Alexander, et al.
Published: (2008)
Antioxidant And Wound Healing Properties Of Cashew And Sweet Potato Shoot Extracts In Rats
by: Javadi, Mehdi
Published: (2009)
by: Javadi, Mehdi
Published: (2009)
Development of vitamin e-enriched nanoemulsion for wound healing
by: Chong, Wai Ting
Published: (2020)
by: Chong, Wai Ting
Published: (2020)
Healing properties of epidermal growth factor and tocotrienol-rich fraction formulation in deep partial-thickness burn wound model
by: Guo, Hui-Fang
Published: (2017)
by: Guo, Hui-Fang
Published: (2017)
Preliminary investigation of Mitragyna speciosa (Korth.) Havil leaves methanol crude extract and formulation towards wound healing property
by: Zakaria, Fazila
Published: (2023)
by: Zakaria, Fazila
Published: (2023)
Predicting the distribution of ancient and other noteworthy trees across the UK
by: Nolan, Victoria Jayne
Published: (2021)
by: Nolan, Victoria Jayne
Published: (2021)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Similar Items
-
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009) -
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011) -
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008) -
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)